EP2445241A2 - Method for authenticating a universal subscriber identity module and system thereof - Google Patents

Method for authenticating a universal subscriber identity module and system thereof Download PDF

Info

Publication number
EP2445241A2
EP2445241A2 EP10789706A EP10789706A EP2445241A2 EP 2445241 A2 EP2445241 A2 EP 2445241A2 EP 10789706 A EP10789706 A EP 10789706A EP 10789706 A EP10789706 A EP 10789706A EP 2445241 A2 EP2445241 A2 EP 2445241A2
Authority
EP
European Patent Office
Prior art keywords
authentication
memory address
usim
stored
switching center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP10789706A
Other languages
German (de)
French (fr)
Other versions
EP2445241A4 (en
EP2445241B1 (en
Inventor
Jung Hyo Lee
Youn Seog Choi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KT Corp
Original Assignee
KT Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KT Corp filed Critical KT Corp
Publication of EP2445241A2 publication Critical patent/EP2445241A2/en
Publication of EP2445241A4 publication Critical patent/EP2445241A4/en
Application granted granted Critical
Publication of EP2445241B1 publication Critical patent/EP2445241B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/387Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using subscriber identification cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers

Definitions

  • the present invention relates, in general, to a method and system for authentication of a Universal Subscriber Identity Module (USIM) and, more particularly, to a method and system for authenticating a USIM, which can prevent the failure of authentication and the impossibility of call service that may occur due to partial damage to memory provided in the USIM during an authentication algorithm (Authentication and Key Agreement: AKA) for Universal Mobile Telecommunications System (UMTS), and which can also reduce costs that may be incurred by replacing USIMs.
  • USIM Universal Subscriber Identity Module
  • AKA Authentication and Key Agreement
  • IMT-2000 International Mobile Telecommunication 2000
  • WCDMA Wideband Code Division Multiple Access
  • GSM Global System for Mobile Communications
  • Authentication is realized by mounting, on a subscriber terminal such as a mobile phone or a wireless terminal, a Universal Subscriber Identity Module (USIM) or a Subscriber Identity Module (SIM), which is a typical subscriber identity module issued by a network service provider or the like making a contract with the subscriber of a mobile communication network.
  • Authentication refers to mutual authentication required upon call origination and termination between the mobile communication network serviced by the network service provider or the like and a subscriber identity module.
  • a subscriber identity module In order for a mobile communication terminal to be provided with call service, a subscriber identity module must be authenticated.
  • a conventional procedure for authenticating a USIM using UMTS AKA is performed in such a way that when the mobile communication terminal sends an authentication request message for the USIM to an authentication server via a mobile switching center, the authentication server transmits authentication vector(s) required to perform authentication to the terminal, and the USIM performs authentication using a memory address, which relates to an index value used in the array scheme of the USIM, and a sequence number included in the authentication vector.
  • the USIM transmits the maximum sequence number separately stored in memory and a memory address corresponding thereto, for example, 550[10] which is the maximum sequence number [memory address], to the mobile switching center, and the mobile switching center sends an authentication failure message to the authentication server.
  • the authentication server generates, for example, three authentication vectors, including sequence numbers generated based on the maximum sequence number and three consecutive memory addresses sequentially increased from the relevant memory address by 1, for example, 551[11], B[12], and C[13], and transmits the authentication vectors to the mobile switching center.
  • the mobile switching center transmits an authentication vector including 551[11] to the relevant terminal, and the terminal performs re-authentication by comparing a sequence number stored in the memory address [11] included in the authentication vector with 551.
  • the authentication server transmits the three authentication vectors to the mobile switching center, and then generates and stores three authentication vectors for subsequent memory addresses. For example, three authentication vectors respectively including D[14], E[15], and F[16] are generated and stored.
  • a message including 550[10] which is the maximum sequence number [memory address] used in the failed authentication is sent to the mobile switching center.
  • the mobile switching center transmits a network fail message to the terminal in conformity with a standard for re-authentication failure to allow the terminal to again attempt to request authentication, and transfers only information about re-authentication failure to the authentication server.
  • the mobile switching center deletes all previously-stored authentication vectors.
  • the mobile switching center When the terminal, having received NetworkFail from the mobile switching center, requests authentication again after several seconds in conformity with the standard, the mobile switching center requests an authentication vector from the authentication server because of the absence of the previously-stored authentication vector(s).
  • the authentication server transmits further three authentication vectors including previously generated/stored D[14], E[15], and F[16] to the mobile switching center, and then the mobile switching center transmits the authentication vector including D[14] to the terminal.
  • An object according to embodiments of the present invention made keeping in mind the above problems is to provide a method and system for authenticating a USIM, which generate an authentication vector while avoiding impaired memory addresses that may result from physical damage to memory provided in the USIM, thus preventing the failure of authentication attributable to the damaged memory, and the impossibility of providing call service attributable to such an authentication failure.
  • Another object according to embodiments of the present invention is to provide a method and system for authenticating a USIM, which prevent problems that may occur due to damaged memory, thus reducing possible costs incurred by replacing the USIM.
  • a method of authenticating a Universal Subscriber Identity Module may include determining whether a memory address of a USIM has been stored when an authentication-related message for the USIM is received via a mobile switching center (VLR/SGSN); if it is determined that the memory address has been stored, updating the memory address to a first memory address increased from the memory address by a predetermined value; generating an authentication vector including the first memory address; and transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  • VLR/SGSN mobile switching center
  • the method may further include, if the memory address has not been stored, and a re-authentication failure message is received via the mobile switching center, storing a memory address transmitted to the USIM in response to a re-authentication request.
  • the method may further include, if the memory address has been stored, calculating a number of receptions of the authentication-related message after the memory address has been stored; and comparing the number of receptions with a preset reference number of times, wherein if the number of receptions is less than the reference number of times, the updating may be performed.
  • the method may further include, if the number of receptions is equal to or greater than the reference number of times, selecting any one from among memory addresses previous to a pre-stored memory address; and generating the authentication vector including the selected memory address.
  • the method may further include, if authentication of the USIM has succeeded, deleting the stored memory address.
  • a method of authenticating a Universal Subscriber Identity Module may include generating a random value when an authentication-related message for a USIM is received via a mobile switching center (VLR/SGSN); dividing the generated random value by a preset memory address, and then calculating a remainder of the division; generating an authentication vector in which the calculated remainder is set to a memory address; and transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  • VLR/SGSN mobile switching center
  • the generating the random value may be configured to determine whether a memory address of the USIM has been stored when the authentication-related message is received, and to generate the random value if it is determined that the memory address has been stored.
  • the preset memory address may be either the stored memory address or a memory address included in the authentication-related message.
  • a system for authenticating a Universal Subscriber Identity Module may include a determination unit for determining whether a memory address of a USIM has been stored when an authentication-related message for the USIM is received via a mobile switching center (VLR/SGSN); a storage unit for, if it is determined that the memory address has been stored, updating the memory address to a first memory address increased from the memory address by a predetermined value; a generation unit for generating an authentication vector including the first memory address; and a transmission unit for transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  • VLR/SGSN mobile switching center
  • a storage unit for, if it is determined that the memory address has been stored, updating the memory address to a first memory address increased from the memory address by a predetermined value
  • a generation unit for generating an authentication vector including the first memory address
  • a transmission unit for transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  • the system may further include a calculation unit for, if it is determined by the determination unit that the memory address has been stored, calculating a number of receptions of the authentication-related message after the memory address has been stored; and a comparison unit for comparing the number of receptions with a preset reference number of times, wherein the storage unit may update the memory address to the first memory address if the number of receptions is less than the reference number of times as a result of the comparison by the comparison unit.
  • the system may further include a first calculation unit for, if the number of receptions is equal to or greater than the reference number of times as the result of the comparison by the comparison unit, generating a random value, and calculating a remainder obtained by dividing the random value by a pre-stored memory address, wherein the generation unit may generate the authentication vector in which the remainder is set to a memory address.
  • a system for authenticating a Universal Subscriber Identity Module may include a calculating unit for, when an aukhentication-related message for a USIM is received via a mobile switching center, generating a random value, and calculating a remainder obtained by dividing the random value by a preset memory address; a generation unit for generating an authentication vector in which the calculated remainder is set to a memory address; and a transmission unit for transmitting the authentication vector to the USIM via the mobile switching center (VLR/SGSN) so that the USIM can perform authentication using the authentication vector.
  • VLR/SGSN mobile switching center
  • a USIM has a form in which a Subscriber Identity Module (SIM) card equipped with subscriber information is combined with a Universal Integrated Circuit Card (UICC), and is configured such that various functions such as user authentication, global roaming and electronic commerce functions are implemented in a single card, the USIM being mounted on a 3rd generation (3G) mobile communication (Wideband Code Division Multiple Access: WCDMA) terminal.
  • SIM Subscriber Identity Module
  • UICC Universal Integrated Circuit Card
  • a SIM is a card-type module that can be used in a mobile phone, and is configured to store personal information so that various types of services such as authentication, charging fees, and a security function can be provided to each subscriber.
  • the USIM has evolved from such a SIM by one step and is a small-sized chip essentially inserted into an asynchronous 3G WCDMA terminal.
  • the USIM is used both as a SIM capable of performing subscriber authentication and as a universal IC card (UICC) capable of including the functions of a transportation card or a credit card.
  • UICC universal IC card
  • the UICC can guarantee the integrity and security of all personal information data by supporting the security of various multiple applications.
  • Such a USIM is composed of a small-sized Central Processing Unit (CPU) and memory, wherein the CPU identifies a user using encryption and decryption functions, and the memory is used as a storage space for a supplementary service.
  • CPU Central Processing Unit
  • memory functions such as that of a credit card, a transportation card or a membership card can be stored, and in particular, a service can be installed in a wireless manner without a separate chip being issued, as long as approval for banking or card services is obtained using Over The Air (OTA) technology.
  • OTA Over The Air
  • the gist of the present invention is to prevent the failure of the authentication of the USIM that may occur due to the physically damaged USIM during a UMTS AKA procedure, and also prevent the impossibility of providing call service due to such an authentication failure.
  • Fig. 1 illustrates a system for authenticating a USIM according to an embodiment of the present invention.
  • the USIM authentication system includes a mobile communication terminal 110, a mobile switching center 130, and an authentication server 140.
  • the mobile communication terminal 110 is a communication device equipped with a USIM 111 for user authentication and capable of performing wireless communication over a WCDMA network, and is configured to be able to perform communication, such as calling to another terminal or any server, message sending, and accessing websites, via the mobile switching center 130 while communicating in a wireless manner with the base station 120 of the WCDMA network.
  • the mobile communication terminal may be referred to as MS (mobile terminal) and the mobile switching center may be referred to as VLR/SGSN in this specification as well as in other literatures.
  • Such a mobile communication terminal 110 requests the authentication of the USIM required to use a mobile communication service from the authentication server 140 via the mobile switching center or VLR/SGSN 130 , receives an authentication vector required for USIM authentication from the authentication server 140 via the mobile switching center 130 and then authenticates the USIM.
  • the authentication server may be referred to as HE, HE/HLR or HE/AuC in this specification as well as in other literatures.
  • the USIM 111 performs authentication using a sequence number and a memory address included in the authentication vector, and determines that authentication has succeeded if preset authentication conditions are satisfied; otherwise, it determines that authentication has failed.
  • the maximum sequence number is a not a value searched for in sequence numbers stored in a plurality of arrays provided in the memory, but a value pre-stored in a separate storage space. Depending on the circumstances, the maximum sequence number stored in the relevant storage space may also be used.
  • the USIM 111 transmits both the maximum sequence number, among the sequence numbers stored in the memory, and a memory address at which that value is stored, to the mobile switching center 130, and then receives an authentication vector newly generated by the authentication server 140 via the mobile switching center 130 and can perform an authentication procedure again using the received authentication vector.
  • a memory address which is included in an authentication vector received in response to an authentication request after the failure of re-authentication, or a memory address, which is included in an authentication vector required for re-authentication, is either a memory address increased by a predetermined value without having the same memory address or a memory address at which authentication succeeded before, unlike the conventional scheme. Accordingly, even if part of the memory address is impaired due to damage to the memory or the USIM, it is possible that authentication can succeed, and then call service can be provided.
  • the mobile switching center 130 When receiving a message related to authentication, for example, an authentication request message or a message including the maximum sequence number and a relevant memory address that are caused by authentication failure, from the mobile communication terminal 110, the mobile switching center 130 sends the authentication -related message to the authentication server 140, and receives an authentication vector from the authentication server 140 and then transmits the authentication vector to the mobile communication terminal 110 so that authentication can be performed by the USIM 111.
  • a message related to authentication for example, an authentication request message or a message including the maximum sequence number and a relevant memory address that are caused by authentication failure
  • the authentication-related message is one of an authentication request message, an authentication failure message and a re-authentication failure message.
  • the mobile switching center 130 may send an authentication request message to the authentication server 140 when an authentication request message is received from the mobile communication terminal 110, may send an authentication failure message to the authentication server 140 when a message attributable to authentication failure is received, and may send a re-authentication failure message to the authentication server 140 when a message attributable to the failure of re-authentication is received.
  • the mobile switching center 130 determines that the authentication of the user has succeeded if authentication has succeeded by the USIM 111, and then provides a requested mobile communication service to the mobile communication terminal 110.
  • the authentication server 140 When the authentication-related message is received from the mobile switching center 130, the authentication server 140 generates an authentication vector including both a sequence number and the memory address of the USIM, and transmits the authentication vector to the mobile communication terminal 110 via the mobile switching center 130. In the present invention, when a re-authentication failure message is received, the authentication server 140 stores the memory address of the USIM transmitted to the mobile communication terminal 110 in response to the re-authentication request.
  • the authentication server 140 In the state in which the memory address of the relevant USIM has been stored, when an authentication-related message, for example, an authentication request message, is received from the mobile switching center 130, the authentication server 140 generates an authentication vector that includes a memory address increased from the stored memory address by a predetermined value, for example, "1" or "2", and a sequence number generated using the private key of the USIM, and transmits the authentication vector to the mobile communication terminal 110 via the mobile switching center 130.
  • a predetermined value for example, "1" or "2”
  • sequence number generated using the private key of the USIM
  • the authentication server 140 may update the stored memory address to a memory address increased by a predetermined value and then store the updated memory address, and may delete the stored memory address if the authentication of the USIM has succeeded using the transmitted authentication vector.
  • the authentication server 140 increases the memory address, transmitted with the memory address included in the authentication vector, by a predetermined value.
  • the memory address included in the authentication vector is a memory address at which trouble has occurred in the memory
  • the conventional problem that occurred due to the same memory address that is, the infinite repetition of the procedure including an authentication request, authentication failure, and re-authentication failure, can be prevented.
  • the memory address at which trouble occurred in the memory may be avoided, and then an authentication procedure based on normal memory addresses may be performed.
  • a plurality of consecutive memory addresses may be impaired due to physical impact or the like. Accordingly, when authentication has failed due to a first memory address that has been initially impaired, an authentication procedure may be infinitely repeated due to the consecutively impaired memory addresses. Accordingly, a method may be additionally performed which calculates the number of times that the authenticatian-related message is received from the mobile switching center 130 in the state in which the memory address has been stored, and which can generate normal memory addresses when the calculated number of receptions is equal to or greater than the preset reference number of times (for example, 3 times).
  • any one of memory addresses previous to the stored memory address for example, any one of addresses [0] to [10] when the stored memory address is assumed to be [11] is included in an authentication vector and the authentication vector needs only to be transmitted because authentication may succeed at a previous memory address existing before authentication failed.
  • the authentication server 140 may sequentially use a method of increasing the memory address included in the authentication vector by a predetermined value and a method of using the remainder obtained by dividing the generated random value by the stored memory address on the basis of certain conditions, but may also perform the authentication procedure using only the remainder.
  • the random value may be a value generated based on the memory address of the relevant USIM stored in the authentication server 140.
  • the authentication server 140 determines whether the memory address of the relevant USIM has been stored, generates a random value and divides the random value by a stored memory address if it is determined that the memory address has been stored, generates an authentication vector including both a memory address corresponding to the remainder of the division and a sequence number, and transmits the authentication vector to the mobile communication terminal 110 via the mobile switching center 130, thus reducing the number of authentication failures that may occur due to the damaged memory of the USIM and increasing the probability of success in authentication.
  • the authentication server 140 may generate an authentication vector using a memory address previous to the memory address included in the message, and transmit the authentication vector to the mobile communication terminal 110 via the mobile switching center 130, thus increasing the probability of success in authentication in the USIM.
  • the remainder obtained by dividing the random value by the received memory address may be generated as a memory address included in the authentication vector.
  • the system for authenticating the USIM generates an authentication vector by avoiding impaired memory addresses at which trouble occurred due to the damaged memory of the USIM, so that the repetition of the authentication failure, which may occur because of the impaired memory addresses, and the impossibility of providing call service due to the authentication failure can be prevented, and in addition, the replacement of a USIM attributable to an insignificant amount of damage to the memory can be prevented to reduce the cost incurred by replacing the USIM.
  • Fig. 2 is a diagram showing the construction of an embodiment of the authentication server of Fig. 1 .
  • the authentication server 140 includes a determination unit 210, a calculation unit 220, a comparison unit 230, a storage unit 240, a generation unit 250, a first calculation unit 260, and a transmission unit 270.
  • the determination unit 210 determines whether the memory address of the relevant USIM has been stored.
  • the authentication server may store the memory address of the authentication vector transmitted to the USIM upon re-authentication, that is, the memory address included in the authentication vector.
  • the relevant memory address may be a memory address at which trouble occurred due to the physically damaged USIM, and thus the stored memory address should be avoided when an authentication-related message is subsequently received.
  • whether the memory address of the USIM is stored denotes whether the re-authentication of the USIM has failed.
  • the fact that the memory address is stored means that even re-authentication has failed.
  • the fact that the memory address is not stored means that authentication has succeeded before re-authentication has failed.
  • the calculation unit 220 calculates the number of receptions of the authentication-related message that is received from the mobile switching center after the memory address has been stored.
  • the calculation unit 220 is configured to calculate the number of failures in the authentication of the USIM after the memory address has been stored.
  • the comparison unit 230 compares the number of receptions calculated by the calculation unit 220 with the preset reference number of times.
  • the reference number of times is configured to prevent authentication failure from being continuously repeated due to the impairment of a plurality of consecutive memory addresses even if the stored memory address is continuously updated.
  • the storage unit 240 updates the memory address by increasing the stored memory address by a predetermined value when, as a result of the comparison by the comparison unit 230, the calculated number of receptions is less than the preset reference number of times.
  • the stored memory address is updated to another value so that a memory address to be included in the authentication vector is changed.
  • the first calculation unit 260 generates a random value, divides the generated random value by the pre-stored memory address, and then obtains the remainder of the division if, as the result of the comparison by the comparison unit 230, the calculated number of receptions is equal to or greater than the reference number of times.
  • the random value may be generated using the pre-stored memory address of the relevant USIM, and the memory address by which the random value will be divided may be either a memory address that is currently stored, or a memory address that is stored due to a re-authentication failure.
  • the generation unit 250 generates an authentication vector in such a way as to generate an authentication vector including the memory address updated by the storage unit 240 and a sequence number if the calculated number of receptions is less than the reference number of times as the result of the comparison by the comparison unit 230, and to generate an authentication vector including a memory address corresponding to the remainder calculated by the first calculation unit 260 and a sequence number if the calculated number of receptions is equal to or greater than the reference number of times as the result of the comparison by the comparison unit 230.
  • the transmission unit 270 transmits the authentication vector generated by the generation unit 250 to the mobile communication terminal via the mobile switching center so that the USIM can perform authentication.
  • Fig. 3 is a diagram showing the construction of another embodiment of the authentication server of Fig. 1 .
  • the authentication server 140 includes a determination unit 310, a calculation unit 320, a generation unit 330, and a transmission unit 340.
  • the determination unit 310 performs the same operation as the determination unit 210 of Fig. 2 . That is, the determination unit 310 determines whether the memory address of a USIM has been stored when an authentication-related message for the USIM is received from a mobile switching center.
  • the calculation unit 320 If it is determined by the determination unit 310 that the memory address of the USIM has been stored, the calculation unit 320 generates a random value and calculates a remainder obtained by dividing the random value by the stored memory address of the USIM.
  • the generation unit 330 generates an authentication vector including both a memory address of the USIM, corresponding to the remainder calculated by the calculation unit 320, and a sequence number.
  • the transmission unit 340 transmits the authentication vector generated by the generation unit 330 to the mobile communication terminal via the mobile switching center.
  • Fig. 4 is an operating flowchart showing a method of authenticating a USIM according to an embodiment of the present invention.
  • the authentication-related message may be any one of an authentication request message, an authentication failure message, and a re-authentication failure message.
  • step 5420 it is determined whether the authentication-reiated message is a re-authentication failure message. If it is determined that the authentication-related message is not a re-authentication failure message, that is, if the authentication-related message is an authentication request message or an authentication failure message, an authentication vector is generated using the same processing procedure as the existing procedure, and is transmitted to the mobile communication terminal equipped with the USIM via the mobile switching center, thus enabling the USIM to perform authentication using the authentication vector at steps 5460, S470, and S450,
  • a sequence number is generated using the private key of the USIM, a memory address is generated depending on a predetermined format, and an authentication vector including both the memory address and the sequence number is generated and is then transmitted to the USIM.
  • a sequence number is generated using the private key of the USIM, and an authentication vector including both a memory address increased from a memory address, at which the maximum sequence number transmitted from the USIM is stored, by'1' and the sequence number is generated and is then transmitted to the USIM.
  • a memory address included in a previous authentication vector that is, an authentication vector required for re-authentication, is stored at step 5480.
  • the time at which the memory address is stored may be designated as the time when the ne-authentication failure message is received as in the case of step S480, but the memory address may also be stored when an authentication vector required for re-authentication is transmitted.
  • the memory address is updated to a memory address increased from the stored memory address by a predetermined value, for example, a first memory address (the stored memory address + the predetermined value), as a new memory address, at step 5430.
  • a predetermined value for example, a first memory address (the stored memory address + the predetermined value)
  • an authentication vector including both a sequence number, which is generated using the private key of the USIM, and the updated first memory address is generated, and is then transmitted to the USIM via the mobile switching center so that the USIM can perform authentication using the generated authentication vector at steps S440 and S450.
  • the stored memory address is deleted, so that when an authenticatian-related message is subsequently received, an authentication vector may be generated using the existing processing procedure or, alternatively, a new memory address may be stored.
  • a memory address for example, the impaired memory address [11] is stored so as to prevent repeated authentication failure and the impossibility of providing the call service due to the authentication failure from occurring when a procedure is repeatedly performed such that when the USIM performs re-authentication using an authentication vector including an impaired memory address 610 in a certain region, as in the case of an example shown in Fig. 6(a) , authentication fails, and such that when an authentication request is received from the terminal after several seconds, the authentication server retransmits the authentication vector including the impaired memory address 610.
  • an authentication vector including a memory address [13] increased from the stored memory address [11] by a predetermined value, for example, "2" is transmitted to the USIM.
  • an authentication vector including a memory address [15] increased from the memory address by "2" is transmitted to the USIM, thus enabling the authentication to succeed. That is, the authentication procedure is performed by avoiding impaired memory addresses, so that the inconvenience felt by the user can be eliminated by preventing authentication failures and the impossibility of providing call service from occurring, and so that authentication can be performed using a USIM with an insignificant amount of damage to reduce costs that may be incurred by replacing a USIM.
  • consecutive memory addresses 620 are impaired due to the physically damaged memory of the USIM as in the case of an example shown in Fig. 6(b)
  • the failure of authentication may be infinitely repeated because of the consecutively impaired memory addresses 620 if the authentication procedure is performed using only the method of Fig. 4 .
  • the authentication failure is repeated a predetermined number of times or more, it is determined that the consecutively impaired memory addresses 620 are present, and then it is preferable to additionally implement a method capable of avoiding such consecutively impaired memory addresses. This method will be described in detail with reference to Fig. 5 .
  • Fig. 5 is an additional operating flowchart showing the USIM authentication method of Fig. 4 .
  • step S510 when a memory address is currently stored at step 5420 of Fig. 4 , the number of times an authentication-related message is received via a mobile switching center is calculated at step S510.
  • the number of receptions of the authentication-related message after the memory address has been stored is calculated, and it can be determined that the memory addresses of the USIM are consecutively impaired depending on the number of receptions after re-authentication has failed.
  • the calculated number of receptions is compared with the preset reference number of times, for example, three times, and then it is determined whether the calculated number of receptions is equal to or greater than the reference number of times at step 5520.
  • step 5520 If it is determined at step 5520 that the number of receptions is equal to or greater than the reference number of times, it is determined that memory addresses are consecutively impaired, and then a random value is generated at step 5530.
  • the random value may be generated either using the stored memory address or using a random function capable of generating a random value.
  • the random value is divided by the stored memory address, and the remainder of the division, that is, a remainder using "random value mod memory address" is calculated at step S540.
  • the memory address used may be either a memory address that has been updated and is currently being stored or a memory address that was stored first, and a memory address to be applied may vary depending on the circumstances.
  • an authentication vector including both a memory address corresponding to the remainder and a sequence number generated using the private key of the USIM is generated at step 5550, and the authentication vector is then transmitted to the USIM at step S450.
  • a memory address corresponding to the remainder and included in the authentication vector corresponds to [00] to [10] at which authentication succeeded, and thus authentication can succeed using the authentication vector including the relevant memory address.
  • step 5520 If it is determined at step 5520 that the number of receptions is less than the reference number of times, step 5430 in Fig. 4 is performed.
  • Fig. 7 is an operating flowchart showing a method of authenticating a USIM according to another embodiment of the present invention.
  • the authentication-related message may be one of an authentication request message, an authentication failure message, and a re-authentication failure message.
  • step 5720 it is determined whether the authentication-related message is a re-authentication failure message. If it is determined that the authentication-related message is an authentication request message or an authentication failure message, rather than a re-authentication failure message, an authentication vector is generated using the same processing procedure as the existing procedure, and is then transmitted to the mobile communication terminal equipped with the USIM via the mobile switching center, thus allowing the USIM to perform authentication using the authentication vector at steps S770, S780, and S760.
  • step S770 If it is determined at step S770 that the received authentication-related message is a re-authentication failure message, a memory address that has been transmitted using a previous authentication vector is stored at step 5790.
  • step S720 If it is determined at step S720 that the memory address has been stored, that is, if the authentication-related message is received after step 5790 has been performed, a random value is generated either using the stored memory address or using a preset random function at step 5730.
  • the generated random value is divided by the stored memory address, and then the remainder of the division is calculated at step S740.
  • an authentication vector including a memory address corresponding to the remainder and a sequence number generated using the private key of the USIM is generated at step S750.
  • the authentication server when it is assumed that the stored memory address among the memory addresses in Fig. 6(b) is [11], and the generated random value is "15", the remainder is "4", and the authentication server generates an authentication vector including both the memory address [04] corresponding to the remainder and the generated sequence number.
  • the generated authentication vector is transmitted to the mobile communication terminal equipped with the USIM via the mobile switching center, thus allowing the USIM to perform authentication using the authentication vector at step S760.
  • the USIM authentication method according to the present invention is configured such that when an authentication failure message including both the maximum sequence number and [memory address] is received regardless of whether a USIM memory address has been stored, an authentication vector including a memory address previous to the memory address included in the message, for example, memory addresses [0] to [10] when the memory address included in the message is [11], may be generated, and the generated authentication vector may then be transmitted to the USIM.
  • the USIM authentication method is configured such that even if some addresses of USIM memory are impaired and the failure of authentication occurs, the memory address information of the USIM is stored, so that when an authentication-related message is subsequently received, a memory address at which there is a possibility of performing successful authentication is included in an authentication vector using the stored memory address, and then the authentication vector is transmitted to the USIM, thus allowing the USIM to succeed in authentication and the terminal to be provided with call service.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Disclosed are a method for authenticating a universal subscriber identity module (USIM) and a system thereof. The method for authenticating a universal subscriber identity module according to one embodiment of the present invention comprises: a step of determining whether the memory address for the USIM is stored when a USIM authentication-related message is received through a switch; a step of updating the memory address to a first memory address in which the memory address is increased by a predetermined value, if it is determined that the memory address is stored; a step of generating an authentication vector including the first memory address; and a step of transmitting the authentication vector to the USIM via the switch such that the USIM performs an authentication using the authentication vector. (Fig. 4)

Description

    Technical Field
  • The present invention relates, in general, to a method and system for authentication of a Universal Subscriber Identity Module (USIM) and, more particularly, to a method and system for authenticating a USIM, which can prevent the failure of authentication and the impossibility of call service that may occur due to partial damage to memory provided in the USIM during an authentication algorithm (Authentication and Key Agreement: AKA) for Universal Mobile Telecommunications System (UMTS), and which can also reduce costs that may be incurred by replacing USIMs.
  • Background Art
  • Authentication has been standardized in International Mobile Telecommunication 2000 (IMT-2000) which is a 3rd generation mobile communication scheme, for example, Wideband Code Division Multiple Access (WCDMA), and in Global System for Mobile Communications (GSM) which is one of 2nd generation mobile communication schemes and has compatibility with IMT-2000.
  • Authentication is realized by mounting, on a subscriber terminal such as a mobile phone or a wireless terminal, a Universal Subscriber Identity Module (USIM) or a Subscriber Identity Module (SIM), which is a typical subscriber identity module issued by a network service provider or the like making a contract with the subscriber of a mobile communication network. Authentication refers to mutual authentication required upon call origination and termination between the mobile communication network serviced by the network service provider or the like and a subscriber identity module.
  • In order for a mobile communication terminal to be provided with call service, a subscriber identity module must be authenticated. A conventional procedure for authenticating a USIM using UMTS AKA is performed in such a way that when the mobile communication terminal sends an authentication request message for the USIM to an authentication server via a mobile switching center, the authentication server transmits authentication vector(s) required to perform authentication to the terminal, and the USIM performs authentication using a memory address, which relates to an index value used in the array scheme of the USIM, and a sequence number included in the authentication vector.
  • That is, when preset authentication conditions are satisfied using the sequence number of the memory address included in the authentication vector and the sequence number included in the authentication vector, it is determined that authentication has succeeded and then the sequence number of a relevant memory address is replaced with and stored as the sequence number included in the authentication vector, whereas when the preset authentication conditions are not satisfied, it is determined that authentication has failed.
  • In this case, when authentication has failed, the USIM transmits the maximum sequence number separately stored in memory and a memory address corresponding thereto, for example, 550[10] which is the maximum sequence number [memory address], to the mobile switching center, and the mobile switching center sends an authentication failure message to the authentication server. Accordingly, the authentication server generates, for example, three authentication vectors, including sequence numbers generated based on the maximum sequence number and three consecutive memory addresses sequentially increased from the relevant memory address by 1, for example, 551[11], B[12], and C[13], and transmits the authentication vectors to the mobile switching center. The mobile switching center transmits an authentication vector including 551[11] to the relevant terminal, and the terminal performs re-authentication by comparing a sequence number stored in the memory address [11] included in the authentication vector with 551.
  • The authentication server transmits the three authentication vectors to the mobile switching center, and then generates and stores three authentication vectors for subsequent memory addresses. For example, three authentication vectors respectively including D[14], E[15], and F[16] are generated and stored.
  • However, when the memory address [11] is impaired and re-authentication fails, a message including 550[10] which is the maximum sequence number [memory address] used in the failed authentication is sent to the mobile switching center. The mobile switching center transmits a network fail message to the terminal in conformity with a standard for re-authentication failure to allow the terminal to again attempt to request authentication, and transfers only information about re-authentication failure to the authentication server. Upon re-authentication failure, the mobile switching center deletes all previously-stored authentication vectors.
  • When the terminal, having received NetworkFail from the mobile switching center, requests authentication again after several seconds in conformity with the standard, the mobile switching center requests an authentication vector from the authentication server because of the absence of the previously-stored authentication vector(s). The authentication server transmits further three authentication vectors including previously generated/stored D[14], E[15], and F[16] to the mobile switching center, and then the mobile switching center transmits the authentication vector including D[14] to the terminal.
  • In this case, if the memory address [14] is also impaired, authentication fails again, and then the terminal requests re-authentication from the mobile switching center by transmitting 550[10] which is the maximum sequence number [memory address] to the mobile switching center. As described above, since the authentication vectors for [11] and [14], at which memory addresses are impaired, are transmitted to the terminal, a procedure including authentication failure, re-authentication failure, and an authentication request after several seconds is continuously repeated, and the failure of authentication is repeated, thus preventing call service from being provided to the terminal.
  • In this way, in the conventional USIM authentication method, when an insignificant amount of damage is caused on USIM memory, and then sequence numbers are changed to an abnormal state, and authentication vectors including impaired memory addresses are received, the above procedure including authentication failure, re-authentication failure, and an authentication request is infinitely repeated. Therefore, in order to be provided with call service as a result of successful authentication, an existing USIM must be replaced with a USIM having non-damaged memory, thus incurring costs attributable to the replacement of the USIM.
  • Detailed Description of the Invention
  • An object according to embodiments of the present invention made keeping in mind the above problems is to provide a method and system for authenticating a USIM, which generate an authentication vector while avoiding impaired memory addresses that may result from physical damage to memory provided in the USIM, thus preventing the failure of authentication attributable to the damaged memory, and the impossibility of providing call service attributable to such an authentication failure.
  • Another object according to embodiments of the present invention is to provide a method and system for authenticating a USIM, which prevent problems that may occur due to damaged memory, thus reducing possible costs incurred by replacing the USIM.
  • In order to accomplish the above objects, a method of authenticating a Universal Subscriber Identity Module (USIM) according to an embodiment of the present invention may include determining whether a memory address of a USIM has been stored when an authentication-related message for the USIM is received via a mobile switching center (VLR/SGSN); if it is determined that the memory address has been stored, updating the memory address to a first memory address increased from the memory address by a predetermined value; generating an authentication vector including the first memory address; and transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  • The method may further include, if the memory address has not been stored, and a re-authentication failure message is received via the mobile switching center, storing a memory address transmitted to the USIM in response to a re-authentication request.
  • The method may further include, if the memory address has been stored, calculating a number of receptions of the authentication-related message after the memory address has been stored; and comparing the number of receptions with a preset reference number of times, wherein if the number of receptions is less than the reference number of times, the updating may be performed.
  • Further, the method may further include, if the number of receptions is equal to or greater than the reference number of times, selecting any one from among memory addresses previous to a pre-stored memory address; and generating the authentication vector including the selected memory address.
  • The method may further include, if authentication of the USIM has succeeded, deleting the stored memory address.
  • A method of authenticating a Universal Subscriber Identity Module (USIM) according to another embodiment of the present invention may include generating a random value when an authentication-related message for a USIM is received via a mobile switching center (VLR/SGSN); dividing the generated random value by a preset memory address, and then calculating a remainder of the division; generating an authentication vector in which the calculated remainder is set to a memory address; and transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  • The generating the random value may be configured to determine whether a memory address of the USIM has been stored when the authentication-related message is received, and to generate the random value if it is determined that the memory address has been stored.
  • The preset memory address may be either the stored memory address or a memory address included in the authentication-related message.
  • A system for authenticating a Universal Subscriber Identity Module (USIM) according to a further embodiment of the present invention may include a determination unit for determining whether a memory address of a USIM has been stored when an authentication-related message for the USIM is received via a mobile switching center (VLR/SGSN); a storage unit for, if it is determined that the memory address has been stored, updating the memory address to a first memory address increased from the memory address by a predetermined value; a generation unit for generating an authentication vector including the first memory address; and a transmission unit for transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  • The system may further include a calculation unit for, if it is determined by the determination unit that the memory address has been stored, calculating a number of receptions of the authentication-related message after the memory address has been stored; and a comparison unit for comparing the number of receptions with a preset reference number of times, wherein the storage unit may update the memory address to the first memory address if the number of receptions is less than the reference number of times as a result of the comparison by the comparison unit.
  • The system may further include a first calculation unit for, if the number of receptions is equal to or greater than the reference number of times as the result of the comparison by the comparison unit, generating a random value, and calculating a remainder obtained by dividing the random value by a pre-stored memory address, wherein the generation unit may generate the authentication vector in which the remainder is set to a memory address.
  • A system for authenticating a Universal Subscriber Identity Module (USIM) according to another aspect of the present invention may include a calculating unit for, when an aukhentication-related message for a USIM is received via a mobile switching center, generating a random value, and calculating a remainder obtained by dividing the random value by a preset memory address; a generation unit for generating an authentication vector in which the calculated remainder is set to a memory address; and a transmission unit for transmitting the authentication vector to the USIM via the mobile switching center (VLR/SGSN) so that the USIM can perform authentication using the authentication vector.
  • Description of Drawings
    • Fig. 1 is a diagram showing a system for authenticating a USIM according to an embodiment of the present invention;
    • Fig. 2 is a diagram showing the construction of an embodiment of the authentication server of Fig. 1;
    • Fig. 3 is a diagram showing the construction of another embodiment of the authentication server of Fig. 1;
    • Fig. 4 is an operating flowchart showing a method of authenticating a USIM according to an embodiment of the present invention;
    • Fig. 5 is an additional operating flowchart showing the USIM authentication method of Fig. 4;
    • Fig. 6 is a diagram illustrating damaged memory to describe the present invention; and
    • Fig. 7 is an operating flowchart showing a method of authenticating a USIM according to another embodiment of the present invention.
    <Description of reference characters of important parts>
    • 140: authentication server or HE/HLR
    • 210: determination unit
    • 220: calculation unit
    • 230: comparison unit
    • 240: storage unit
    • 250: generation unit
    • 260: first calculation unit
    • 270: transmission unit
    Best Mode
  • The above and other objects and features of the present invention will be more clearly understood from the following detailed description of embodiments taken in conjunction with the accompanying drawings.
  • Preferred embodiments of the present invention will be described in detail with reference to the attached drawings. In the description of the present invention, detailed description of related well-known components or functions will be omitted.
  • Hereinafter, a method and system for authenticating a Universal Subscriber Identity Module (USIM) according to embodiments of the present invention will be described in detail with reference to Figs. 1 to 7.
  • A USIM has a form in which a Subscriber Identity Module (SIM) card equipped with subscriber information is combined with a Universal Integrated Circuit Card (UICC), and is configured such that various functions such as user authentication, global roaming and electronic commerce functions are implemented in a single card, the USIM being mounted on a 3rd generation (3G) mobile communication (Wideband Code Division Multiple Access: WCDMA) terminal.
  • A SIM is a card-type module that can be used in a mobile phone, and is configured to store personal information so that various types of services such as authentication, charging fees, and a security function can be provided to each subscriber. The USIM has evolved from such a SIM by one step and is a small-sized chip essentially inserted into an asynchronous 3G WCDMA terminal.
  • The USIM is used both as a SIM capable of performing subscriber authentication and as a universal IC card (UICC) capable of including the functions of a transportation card or a credit card. The UICC can guarantee the integrity and security of all personal information data by supporting the security of various multiple applications.
  • Such a USIM is composed of a small-sized Central Processing Unit (CPU) and memory, wherein the CPU identifies a user using encryption and decryption functions, and the memory is used as a storage space for a supplementary service. In the memory, functions such as that of a credit card, a transportation card or a membership card can be stored, and in particular, a service can be installed in a wireless manner without a separate chip being issued, as long as approval for banking or card services is obtained using Over The Air (OTA) technology.
  • The gist of the present invention is to prevent the failure of the authentication of the USIM that may occur due to the physically damaged USIM during a UMTS AKA procedure, and also prevent the impossibility of providing call service due to such an authentication failure.
  • Fig. 1 illustrates a system for authenticating a USIM according to an embodiment of the present invention.
  • Referring to Fig. 1, the USIM authentication system includes a mobile communication terminal 110, a mobile switching center 130, and an authentication server 140.
  • The mobile communication terminal 110 is a communication device equipped with a USIM 111 for user authentication and capable of performing wireless communication over a WCDMA network, and is configured to be able to perform communication, such as calling to another terminal or any server, message sending, and accessing websites, via the mobile switching center 130 while communicating in a wireless manner with the base station 120 of the WCDMA network. The mobile communication terminal may be referred to as MS (mobile terminal) and the mobile switching center may be referred to as VLR/SGSN in this specification as well as in other literatures.
  • Such a mobile communication terminal 110 requests the authentication of the USIM required to use a mobile communication service from the authentication server 140 via the mobile switching center or VLR/SGSN 130 , receives an authentication vector required for USIM authentication from the authentication server 140 via the mobile switching center 130 and then authenticates the USIM. The authentication server may be referred to as HE, HE/HLR or HE/AuC in this specification as well as in other literatures.
  • The USIM 111 performs authentication using a sequence number and a memory address included in the authentication vector, and determines that authentication has succeeded if preset authentication conditions are satisfied; otherwise, it determines that authentication has failed.
  • Here, the authentication conditions are given such that a sequence number SQN_USIM, stored in the memory address of the USIM included in the authentication vector, must be less than a sequence number SQN_AUC included in the authentication vector, and the sequence number SQN_AUC included in the authentication vector must be less than the sum of the maximum sequence number SQN_MAX stored in the USIM and a preset value (Delta = 228). That is, the USIM determines that authentication has succeeded if both the two conditions of "SQN_AUC > SQN_USIM" and "SQN_AUC < SQN_MAX + Delta" are satisfied and that authentication has failed if either of the two conditions is not satisfied.
  • In this case, the maximum sequence number is a not a value searched for in sequence numbers stored in a plurality of arrays provided in the memory, but a value pre-stored in a separate storage space. Depending on the circumstances, the maximum sequence number stored in the relevant storage space may also be used.
  • If authentication has failed, the USIM 111 transmits both the maximum sequence number, among the sequence numbers stored in the memory, and a memory address at which that value is stored, to the mobile switching center 130, and then receives an authentication vector newly generated by the authentication server 140 via the mobile switching center 130 and can perform an authentication procedure again using the received authentication vector.
  • Further, if the authentication of the USIM has failed and even the re-authentication of the USIM fails, the mobile communication terminal 110 sends an authentication request message for requesting authentication again after a predetermined time has elapsed. In the present invention, a memory address, which is included in an authentication vector received in response to an authentication request after the failure of re-authentication, or a memory address, which is included in an authentication vector required for re-authentication, is either a memory address increased by a predetermined value without having the same memory address or a memory address at which authentication succeeded before, unlike the conventional scheme. Accordingly, even if part of the memory address is impaired due to damage to the memory or the USIM, it is possible that authentication can succeed, and then call service can be provided.
  • When receiving a message related to authentication, for example, an authentication request message or a message including the maximum sequence number and a relevant memory address that are caused by authentication failure, from the mobile communication terminal 110, the mobile switching center 130 sends the authentication -related message to the authentication server 140, and receives an authentication vector from the authentication server 140 and then transmits the authentication vector to the mobile communication terminal 110 so that authentication can be performed by the USIM 111.
  • In this case, the authentication-related message is one of an authentication request message, an authentication failure message and a re-authentication failure message. The mobile switching center 130 may send an authentication request message to the authentication server 140 when an authentication request message is received from the mobile communication terminal 110, may send an authentication failure message to the authentication server 140 when a message attributable to authentication failure is received, and may send a re-authentication failure message to the authentication server 140 when a message attributable to the failure of re-authentication is received. These contents are apparent to those skilled in the art, and thus a detailed description thereof will be omitted.
  • The mobile switching center 130 determines that the authentication of the user has succeeded if authentication has succeeded by the USIM 111, and then provides a requested mobile communication service to the mobile communication terminal 110.
  • When the authentication-related message is received from the mobile switching center 130, the authentication server 140 generates an authentication vector including both a sequence number and the memory address of the USIM, and transmits the authentication vector to the mobile communication terminal 110 via the mobile switching center 130. In the present invention, when a re-authentication failure message is received, the authentication server 140 stores the memory address of the USIM transmitted to the mobile communication terminal 110 in response to the re-authentication request. In the state in which the memory address of the relevant USIM has been stored, when an authentication-related message, for example, an authentication request message, is received from the mobile switching center 130, the authentication server 140 generates an authentication vector that includes a memory address increased from the stored memory address by a predetermined value, for example, "1" or "2", and a sequence number generated using the private key of the USIM, and transmits the authentication vector to the mobile communication terminal 110 via the mobile switching center 130.
  • In this case, the authentication server 140 may update the stored memory address to a memory address increased by a predetermined value and then store the updated memory address, and may delete the stored memory address if the authentication of the USIM has succeeded using the transmitted authentication vector.
  • That is, if the authentication request message or the authentication failure message is received in the state in which the memory address of the relevant USIM has been stored, the authentication server 140 increases the memory address, transmitted with the memory address included in the authentication vector, by a predetermined value. As a result, when the memory address included in the authentication vector is a memory address at which trouble has occurred in the memory, the conventional problem that occurred due to the same memory address, that is, the infinite repetition of the procedure including an authentication request, authentication failure, and re-authentication failure, can be prevented. By way of this operation, the memory address at which trouble occurred in the memory may be avoided, and then an authentication procedure based on normal memory addresses may be performed.
  • In the memory of the USIM, a plurality of consecutive memory addresses may be impaired due to physical impact or the like. Accordingly, when authentication has failed due to a first memory address that has been initially impaired, an authentication procedure may be infinitely repeated due to the consecutively impaired memory addresses. Accordingly, a method may be additionally performed which calculates the number of times that the authenticatian-related message is received from the mobile switching center 130 in the state in which the memory address has been stored, and which can generate normal memory addresses when the calculated number of receptions is equal to or greater than the preset reference number of times (for example, 3 times).
  • In this case, as an example of a method of generating normal memory addresses, any one of memory addresses previous to the stored memory address, for example, any one of addresses [0] to [10] when the stored memory address is assumed to be [11], is included in an authentication vector and the authentication vector needs only to be transmitted because authentication may succeed at a previous memory address existing before authentication failed. There may be various methods capable of including the memory address, previous to the memory address stored in the authentication server 140, in the authentication vector and transmitting the authentication vector. For example, a random value may be generated, and such a random value RND may be divided by a stored memory address A, and a memory address corresponding to the remainder (RND mod A) of the division may be included in the authentication vector.
  • Of course, the authentication server 140 may sequentially use a method of increasing the memory address included in the authentication vector by a predetermined value and a method of using the remainder obtained by dividing the generated random value by the stored memory address on the basis of certain conditions, but may also perform the authentication procedure using only the remainder.
  • In this case, the random value may be a value generated based on the memory address of the relevant USIM stored in the authentication server 140.
  • That is, when an authentication-related message is received from the mobile switching center 130, the authentication server 140 determines whether the memory address of the relevant USIM has been stored, generates a random value and divides the random value by a stored memory address if it is determined that the memory address has been stored, generates an authentication vector including both a memory address corresponding to the remainder of the division and a sequence number, and transmits the authentication vector to the mobile communication terminal 110 via the mobile switching center 130, thus reducing the number of authentication failures that may occur due to the damaged memory of the USIM and increasing the probability of success in authentication.
  • Furthermore, when an authentication failure message including the maximum sequence number and [memory address] is received from the mobile switching center regardless of whether the memory address has been stored, the authentication server 140 may generate an authentication vector using a memory address previous to the memory address included in the message, and transmit the authentication vector to the mobile communication terminal 110 via the mobile switching center 130, thus increasing the probability of success in authentication in the USIM.
  • Of course, there may be various methods of generating a memory address previous to a memory address having the maximum sequence number. For example, after the above-described random value has been generated, the remainder obtained by dividing the random value by the received memory address may be generated as a memory address included in the authentication vector.
  • In this way, the system for authenticating the USIM according to the embodiment of the present invention generates an authentication vector by avoiding impaired memory addresses at which trouble occurred due to the damaged memory of the USIM, so that the repetition of the authentication failure, which may occur because of the impaired memory addresses, and the impossibility of providing call service due to the authentication failure can be prevented, and in addition, the replacement of a USIM attributable to an insignificant amount of damage to the memory can be prevented to reduce the cost incurred by replacing the USIM.
  • Fig. 2 is a diagram showing the construction of an embodiment of the authentication server of Fig. 1.
  • Referring to Fig. 2, the authentication server 140 includes a determination unit 210, a calculation unit 220, a comparison unit 230, a storage unit 240, a generation unit 250, a first calculation unit 260, and a transmission unit 270.
  • When an authentication-related message for the USIM, for example, any one of an authentication request message, an authentication failure message and a re-authentication failure message is received from the mobile switching center, the determination unit 210 determines whether the memory address of the relevant USIM has been stored.
  • If the authentication server transmits an authentication vector required for re-authentication to the USIM in the state in which the memory address of the USIM is not stored, and thereafter receives a re-authentication failure message via the mobile switching center, the authentication server may store the memory address of the authentication vector transmitted to the USIM upon re-authentication, that is, the memory address included in the authentication vector.
  • The reason for this is that the relevant memory address may be a memory address at which trouble occurred due to the physically damaged USIM, and thus the stored memory address should be avoided when an authentication-related message is subsequently received.
  • That is, whether the memory address of the USIM is stored denotes whether the re-authentication of the USIM has failed. The fact that the memory address is stored means that even re-authentication has failed. The fact that the memory address is not stored means that authentication has succeeded before re-authentication has failed.
  • If it is determined by the determination unit 210 that the memory address has been stored, the calculation unit 220 calculates the number of receptions of the authentication-related message that is received from the mobile switching center after the memory address has been stored.
  • That is, the calculation unit 220 is configured to calculate the number of failures in the authentication of the USIM after the memory address has been stored.
  • The comparison unit 230 compares the number of receptions calculated by the calculation unit 220 with the preset reference number of times.
  • Here, the reference number of times is configured to prevent authentication failure from being continuously repeated due to the impairment of a plurality of consecutive memory addresses even if the stored memory address is continuously updated.
  • The storage unit 240 updates the memory address by increasing the stored memory address by a predetermined value when, as a result of the comparison by the comparison unit 230, the calculated number of receptions is less than the preset reference number of times.
  • That is, the stored memory address is updated to another value so that a memory address to be included in the authentication vector is changed.
  • The first calculation unit 260 generates a random value, divides the generated random value by the pre-stored memory address, and then obtains the remainder of the division if, as the result of the comparison by the comparison unit 230, the calculated number of receptions is equal to or greater than the reference number of times.
  • In this case, the random value may be generated using the pre-stored memory address of the relevant USIM, and the memory address by which the random value will be divided may be either a memory address that is currently stored, or a memory address that is stored due to a re-authentication failure.
  • The generation unit 250 generates an authentication vector in such a way as to generate an authentication vector including the memory address updated by the storage unit 240 and a sequence number if the calculated number of receptions is less than the reference number of times as the result of the comparison by the comparison unit 230, and to generate an authentication vector including a memory address corresponding to the remainder calculated by the first calculation unit 260 and a sequence number if the calculated number of receptions is equal to or greater than the reference number of times as the result of the comparison by the comparison unit 230.
  • The transmission unit 270 transmits the authentication vector generated by the generation unit 250 to the mobile communication terminal via the mobile switching center so that the USIM can perform authentication.
  • Fig. 3 is a diagram showing the construction of another embodiment of the authentication server of Fig. 1.
  • Referring to Fig. 3, the authentication server 140 includes a determination unit 310, a calculation unit 320, a generation unit 330, and a transmission unit 340.
  • The determination unit 310 performs the same operation as the determination unit 210 of Fig. 2. That is, the determination unit 310 determines whether the memory address of a USIM has been stored when an authentication-related message for the USIM is received from a mobile switching center.
  • If it is determined by the determination unit 310 that the memory address of the USIM has been stored, the calculation unit 320 generates a random value and calculates a remainder obtained by dividing the random value by the stored memory address of the USIM.
  • The generation unit 330 generates an authentication vector including both a memory address of the USIM, corresponding to the remainder calculated by the calculation unit 320, and a sequence number.
  • The transmission unit 340 transmits the authentication vector generated by the generation unit 330 to the mobile communication terminal via the mobile switching center.
  • Fig. 4 is an operating flowchart showing a method of authenticating a USIM according to an embodiment of the present invention.
  • Referring to Fig. 4, in the USIM authentication method, when an authentication-related message for a USIM is received via a mobile switching center, it is determined whether the memory address of the USIM has been stored at steps S410 and 5420.
  • Here, the authentication-related message may be any one of an authentication request message, an authentication failure message, and a re-authentication failure message.
  • If it is determined at step 5420 that the memory address of the USIM has not been stored, it is determined whether the authentication-reiated message is a re-authentication failure message. If it is determined that the authentication-related message is not a re-authentication failure message, that is, if the authentication-related message is an authentication request message or an authentication failure message, an authentication vector is generated using the same processing procedure as the existing procedure, and is transmitted to the mobile communication terminal equipped with the USIM via the mobile switching center, thus enabling the USIM to perform authentication using the authentication vector at steps 5460, S470, and S450,
  • For example, if an authentication request message is received, a sequence number is generated using the private key of the USIM, a memory address is generated depending on a predetermined format, and an authentication vector including both the memory address and the sequence number is generated and is then transmitted to the USIM. If an authentication failure message is received, a sequence number is generated using the private key of the USIM, and an authentication vector including both a memory address increased from a memory address, at which the maximum sequence number transmitted from the USIM is stored, by'1' and the sequence number is generated and is then transmitted to the USIM.
  • Meanwhile, if it is determined at step S460 that the received authentication-related message is a re-authentication failure message, a memory address included in a previous authentication vector, that is, an authentication vector required for re-authentication, is stored at step 5480.
  • Of course, the time at which the memory address is stored may be designated as the time when the ne-authentication failure message is received as in the case of step S480, but the memory address may also be stored when an authentication vector required for re-authentication is transmitted.
  • If it is determined at step S420 that the memory address has been stored, the memory address is updated to a memory address increased from the stored memory address by a predetermined value, for example, a first memory address (the stored memory address + the predetermined value), as a new memory address, at step 5430.
  • When the memory address is updated to the first memory address, an authentication vector including both a sequence number, which is generated using the private key of the USIM, and the updated first memory address is generated, and is then transmitted to the USIM via the mobile switching center so that the USIM can perform authentication using the generated authentication vector at steps S440 and S450.
  • Of course, if the authentication of the USIM has succeeded in the state in which the memory address is stored, the stored memory address is deleted, so that when an authenticatian-related message is subsequently received, an authentication vector may be generated using the existing processing procedure or, alternatively, a new memory address may be stored.
  • As described above, in the USIM authentication method according to the embodiment of the present invention, a memory address, for example, the impaired memory address [11], is stored so as to prevent repeated authentication failure and the impossibility of providing the call service due to the authentication failure from occurring when a procedure is repeatedly performed such that when the USIM performs re-authentication using an authentication vector including an impaired memory address 610 in a certain region, as in the case of an example shown in Fig. 6(a), authentication fails, and such that when an authentication request is received from the terminal after several seconds, the authentication server retransmits the authentication vector including the impaired memory address 610. Thereafter, when an authentication-related message is received from the USIM, an authentication vector including a memory address [13] increased from the stored memory address [11] by a predetermined value, for example, "2", is transmitted to the USIM. Further, when authentication has failed, an authentication vector including a memory address [15] increased from the memory address by "2" is transmitted to the USIM, thus enabling the authentication to succeed. That is, the authentication procedure is performed by avoiding impaired memory addresses, so that the inconvenience felt by the user can be eliminated by preventing authentication failures and the impossibility of providing call service from occurring, and so that authentication can be performed using a USIM with an insignificant amount of damage to reduce costs that may be incurred by replacing a USIM.
  • Depending on the circumstances, when consecutive memory addresses 620 are impaired due to the physically damaged memory of the USIM as in the case of an example shown in Fig. 6(b), the failure of authentication may be infinitely repeated because of the consecutively impaired memory addresses 620 if the authentication procedure is performed using only the method of Fig. 4. Accordingly, when the authentication failure is repeated a predetermined number of times or more, it is determined that the consecutively impaired memory addresses 620 are present, and then it is preferable to additionally implement a method capable of avoiding such consecutively impaired memory addresses. This method will be described in detail with reference to Fig. 5.
  • Fig. 5 is an additional operating flowchart showing the USIM authentication method of Fig. 4.
  • Referring to Fig. 5, when a memory address is currently stored at step 5420 of Fig. 4, the number of times an authentication-related message is received via a mobile switching center is calculated at step S510.
  • That is, the number of receptions of the authentication-related message after the memory address has been stored is calculated, and it can be determined that the memory addresses of the USIM are consecutively impaired depending on the number of receptions after re-authentication has failed.
  • Thereafter, the calculated number of receptions is compared with the preset reference number of times, for example, three times, and then it is determined whether the calculated number of receptions is equal to or greater than the reference number of times at step 5520.
  • If it is determined at step 5520 that the number of receptions is equal to or greater than the reference number of times, it is determined that memory addresses are consecutively impaired, and then a random value is generated at step 5530.
  • In this case, the random value may be generated either using the stored memory address or using a random function capable of generating a random value.
  • When the random value is generated, the random value is divided by the stored memory address, and the remainder of the division, that is, a remainder using "random value mod memory address" is calculated at step S540.
  • Here, the memory address used may be either a memory address that has been updated and is currently being stored or a memory address that was stored first, and a memory address to be applied may vary depending on the circumstances.
  • Once the remainder has been calculated, an authentication vector including both a memory address corresponding to the remainder and a sequence number generated using the private key of the USIM is generated at step 5550, and the authentication vector is then transmitted to the USIM at step S450.
  • As seen in the above procedure, if it is assumed that the memory address used to calculate the remainder is the first memory address [11] at which impairment occurred in Fig. 6(b), a memory address corresponding to the remainder and included in the authentication vector corresponds to [00] to [10] at which authentication succeeded, and thus authentication can succeed using the authentication vector including the relevant memory address.
  • If it is determined at step 5520 that the number of receptions is less than the reference number of times, step 5430 in Fig. 4 is performed.
  • Fig. 7 is an operating flowchart showing a method of authenticating a USIM according to another embodiment of the present invention.
  • Referring to Fig. 7, in the USIM authentication method, when an authentication-related message for a USIM is received via a mobile switching center, it is determined whether the memory address of the USIM has been stored at steps S710 and S720.
  • Here, the authentication-related message may be one of an authentication request message, an authentication failure message, and a re-authentication failure message.
  • If it is determined at step 5720 that the memory address of the USIM has not been stored, it is determined whether the authentication-related message is a re-authentication failure message. If it is determined that the authentication-related message is an authentication request message or an authentication failure message, rather than a re-authentication failure message, an authentication vector is generated using the same processing procedure as the existing procedure, and is then transmitted to the mobile communication terminal equipped with the USIM via the mobile switching center, thus allowing the USIM to perform authentication using the authentication vector at steps S770, S780, and S760.
  • If it is determined at step S770 that the received authentication-related message is a re-authentication failure message, a memory address that has been transmitted using a previous authentication vector is stored at step 5790.
  • If it is determined at step S720 that the memory address has been stored, that is, if the authentication-related message is received after step 5790 has been performed, a random value is generated either using the stored memory address or using a preset random function at step 5730.
  • The generated random value is divided by the stored memory address, and then the remainder of the division is calculated at step S740.
  • That is, the remainder is calculated using "random value mod memory address".
  • Once the remainder has been calculated, an authentication vector including a memory address corresponding to the remainder and a sequence number generated using the private key of the USIM is generated at step S750.
  • For example, when it is assumed that the stored memory address among the memory addresses in Fig. 6(b) is [11], and the generated random value is "15", the remainder is "4", and the authentication server generates an authentication vector including both the memory address [04] corresponding to the remainder and the generated sequence number.
  • The generated authentication vector is transmitted to the mobile communication terminal equipped with the USIM via the mobile switching center, thus allowing the USIM to perform authentication using the authentication vector at step S760.
  • Further, although not shown in the drawings, the USIM authentication method according to the present invention is configured such that when an authentication failure message including both the maximum sequence number and [memory address] is received regardless of whether a USIM memory address has been stored, an authentication vector including a memory address previous to the memory address included in the message, for example, memory addresses [0] to [10] when the memory address included in the message is [11], may be generated, and the generated authentication vector may then be transmitted to the USIM.
  • In this way, the USIM authentication method according to another embodiment of the present invention is configured such that even if some addresses of USIM memory are impaired and the failure of authentication occurs, the memory address information of the USIM is stored, so that when an authentication-related message is subsequently received, a memory address at which there is a possibility of performing successful authentication is included in an authentication vector using the stored memory address, and then the authentication vector is transmitted to the USIM, thus allowing the USIM to succeed in authentication and the terminal to be provided with call service.
  • Furthermore, even if part of the USIM memory is damaged, an authentication procedure is performed while avoiding impaired memory addresses, thus lengthening the usage period of the USIM and reducing the costs incurred by replacing the USIM thanks to the lengthening.
  • The method and system for authenticating a USIM according to the present invention may be modified or applied in various forms within the scope of the technical spirit of the present invention, and are not limited to the above embodiments. Further, the embodiments and drawings are merely intended to describe the contents of the invention in detail, and are not intended to limit the scope of the technical spirit of the invention. In the above-described present invention, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention. Therefore, it is apparent that the present invention is not limited by the embodiments and the attached drawings, and the scope of the present invention should be defined by the accompanying claims and equivalents thereof.

Claims (17)

  1. A method of authenticating a Universal Subscriber Identity Module (USIM), comprising:
    determining whether a memory address of a USIM has been stored when an authentication-related message for the USIM is received via a mobile switching center (VLR/SGSN);
    if it is determined that the memory address has been stored, updating the memory address to a first memory address increased from the memory address by a predetermined value;
    generating an authentication vector including the first memory address; and
    transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  2. The method according to claim 1, wherein the authentication-related message is any one of an authentication request message, an authentication failure message, and a re-authentication failure message.
  3. The method according to claim 1 or 2, further comprising:
    if the memory address has not been stored, and a re-authentication failure message is received via the mobile switching center, storing a memory address transmitted to the USIM in response to a re-authentication request.
  4. The method according to claim 1 or 2, further comprising:
    if the memory address has been stored, calculating a number of receptions of the authentication-related message after the memory address has been stored; and
    comparing the number of receptions with a preset reference number of times,
    wherein if the number of receptions is less than the reference number of times, the updating is performed.
  5. The method according to claim 4, further comprising:
    if the number of receptions is equal to or greater than the reference number of times, selecting any one from among memory addresses previous to a pre-stored memory address; and
    generating the authentication vector including the selected memory address.
  6. The method according to claim 5, wherein the selecting is configured to generate a random value, divide the random value by the pre-stored memory address, and select a remainder of the division as a memory address.
  7. The method according to claim 1 or 2, further comprising:
    if authentication of the USIM has succeeded, deleting the stored memory address.
  8. A method of authenticating a Universal Subscriber Identity Module (USIM), comprising:
    generating a random value when an authentication-related message for a USIM is received via a mobile switching center (VLR/SGSN);
    dividing the generated random value by a preset memory address, and then calculating a remainder of the division;
    generating an authentication vector in which the calculated remainder is set to a memory address; and
    transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  9. The method according to claim 8, wherein the generating the random value is configured to determine whether a memory address of the USIM has been stored when the authentication-related message is received, and to generate the random value if it is determined that the memory address has been stored.
  10. The method according to claim 8 or 9, wherein the preset memory address is either the stored memory address or a memory address included in the authentication-related message.
  11. The method according to claim 8 or 9, wherein the authentication-related message is any one of an authentication request message, an authentication failure message, and a re-authentication failure message.
  12. The method according to claim 9, further comprising:
    if the memory address has not been stored, and a re-authentication failure message is received via the mobile switching center, storing a memory address transmitted to the USIM in response to a re-authentication request.
  13. A system for authenticating a Universal Subscriber Identity Module (USIM), comprising:
    a determination unit for determining whether a memory address of a USIM has been stored when an authentication-related message for the USIM is received via a mobile switching center (VLR/SGSN);
    a storage unit for, if it is determined that the memory address has been stored, updating the memory address to a first memory address increased from the memory address by a predetermined value;
    a generation unit for generating an authentication vector including the first memory address; and
    a transmission unit for transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  14. The system according to claim 13, further comprising:
    a calculation unit for, if it is determined by the determination unit that the memory address has been stored, calculating a number of receptions of the authentication-related message after the memory address has been stored; and
    a comparison unit for comparing the number of receptions with a preset reference number of times,
    wherein the storage unit updates the memory address to the first memory address if the number of receptions is less than the reference number of times as a result of the comparison by the comparison unit.
  15. The system according to claim 14, further comprising:
    a first calculation unit for, if the number of receptions is equal to or greater than the reference number of times as the result of the comparison by the comparison unit, generating a random value, and calculating a remainder obtained by dividing the random value by a pre-stored memory address,
    wherein the generation unit generates the authentication vector in which the remainder is set to a memory address.
  16. A system for authenticating a Universal Subscriber Identity Module (USIM), comprising:
    a calculating unit for, when an authentication-related message for a USIM is received via a mobile switching center (VLR/SGSN), generating a random value, and calculating a remainder obtained by dividing the random value by a preset memory address;
    a generation unit for generating an authentication vector in which the calculated remainder is set to a memory address; and
    a transmission unit for transmitting the authentication vector to the USIM via the mobile switching center so that the USIM can perform authentication using the authentication vector.
  17. The system according to claim 16, further comprising:
    a determination unit for determining whether a memory address of the USIM has been stored when the authentication-related message is received,
    wherein the calculation unit generates the random value if it is determined that the memory address has been stored, and
    wherein the preset memory address is either the stored memory address or a memory address included in the authentication-related message.
EP10789706.8A 2009-06-16 2010-06-16 Method for authenticating a universal subscriber identity module and system thereof Active EP2445241B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020090053244A KR101671188B1 (en) 2009-06-16 2009-06-16 Method and system for certificating universal subscriber identity module
PCT/KR2010/003860 WO2010147379A2 (en) 2009-06-16 2010-06-16 Method for authenticating a universal subscriber identity module and system thereof

Publications (3)

Publication Number Publication Date
EP2445241A2 true EP2445241A2 (en) 2012-04-25
EP2445241A4 EP2445241A4 (en) 2015-01-21
EP2445241B1 EP2445241B1 (en) 2018-08-08

Family

ID=43356904

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10789706.8A Active EP2445241B1 (en) 2009-06-16 2010-06-16 Method for authenticating a universal subscriber identity module and system thereof

Country Status (6)

Country Link
US (1) US8611857B2 (en)
EP (1) EP2445241B1 (en)
JP (1) JP5706404B2 (en)
KR (1) KR101671188B1 (en)
CN (1) CN102461232B (en)
WO (1) WO2010147379A2 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9407614B2 (en) * 2013-03-13 2016-08-02 Paypal, Inc. Systems and methods for determining an authentication attempt threshold
WO2019043750A1 (en) 2017-08-28 2019-03-07 三菱電機株式会社 Communication device, operation procedure management method, and operation procedure management program
US10952062B2 (en) 2018-02-26 2021-03-16 Blackberry Limited Steering of roaming in wireless communication networks
US11172426B2 (en) * 2018-10-05 2021-11-09 Qualcomm Incorporated Techniques for routing ID update
KR102224570B1 (en) * 2019-05-16 2021-03-09 주식회사 웅진 Method for providing rental service, system and computer-readable medium recording the method
WO2021151218A1 (en) * 2020-01-28 2021-08-05 Qualcomm Incorporated Universal integrated circuit card (uicc) activation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001078306A1 (en) * 2000-04-06 2001-10-18 Nokia Corporation Method and system for generating a sequence number to be used for authentication
GB2365687A (en) * 2000-08-02 2002-02-20 Vodafone Ltd Authentication process using sequence numbers

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6950521B1 (en) 2000-06-13 2005-09-27 Lucent Technologies Inc. Method for repeated authentication of a user subscription identity module
CN1717110A (en) * 2004-07-01 2006-01-04 株式会社Ntt都科摩 Authentication vector generation device and method, subscriber identity module, mobile communication system
JP4664050B2 (en) 2004-07-01 2011-04-06 株式会社エヌ・ティ・ティ・ドコモ Authentication vector generation apparatus, subscriber authentication module, mobile communication system, authentication vector generation method, calculation method, and subscriber authentication method
JP2006170762A (en) * 2004-12-15 2006-06-29 Seiko Instruments Inc Multi-functional timepiece with sectorial hand movement wheel train and sectorial hand movement wheel train device
KR100753281B1 (en) * 2005-02-28 2007-08-29 주식회사 팬택앤큐리텔 Method for authenticating ruim card
JP3944216B2 (en) * 2005-03-11 2007-07-11 株式会社エヌ・ティ・ティ・ドコモ Authentication device, portable terminal, and authentication method
JP2007004292A (en) * 2005-06-21 2007-01-11 Ricoh Co Ltd Program and information processor
JP4947978B2 (en) * 2006-01-05 2012-06-06 株式会社アルファシステムズ Authentication system and authentication method
JP4642006B2 (en) * 2006-11-27 2011-03-02 株式会社エヌ・ティ・ティ・ドコモ Subscriber authentication module, contactless IC chip, authentication vector generation device, mobile communication system, and authentication vector generation method
WO2008146476A1 (en) * 2007-05-24 2008-12-04 Panasonic Corporation Memory controller, nonvolatile storage device, nonvolatile storage system, and access device
US7651920B2 (en) * 2007-06-29 2010-01-26 Infineon Technologies Ag Noise reduction in semiconductor device using counter-doping
KR101009871B1 (en) 2007-08-09 2011-01-19 한국과학기술원 Authentication method in a communication system
JP4989418B2 (en) * 2007-10-26 2012-08-01 三菱電機株式会社 Program conversion apparatus, program, and program conversion method
KR20090053244A (en) 2007-11-23 2009-05-27 대지종건(주) Rotary joint
KR20100003860A (en) 2008-07-02 2010-01-12 희성전자 주식회사 Mercury free flat fluorescent lamp
JP4620146B2 (en) * 2008-07-18 2011-01-26 株式会社東芝 Information processing apparatus and authentication method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001078306A1 (en) * 2000-04-06 2001-10-18 Nokia Corporation Method and system for generating a sequence number to be used for authentication
GB2365687A (en) * 2000-08-02 2002-02-20 Vodafone Ltd Authentication process using sequence numbers

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2010147379A2 *

Also Published As

Publication number Publication date
WO2010147379A2 (en) 2010-12-23
US20120282898A1 (en) 2012-11-08
CN102461232B (en) 2014-12-10
US8611857B2 (en) 2013-12-17
KR20100134892A (en) 2010-12-24
EP2445241A4 (en) 2015-01-21
WO2010147379A3 (en) 2011-04-14
EP2445241B1 (en) 2018-08-08
CN102461232A (en) 2012-05-16
JP5706404B2 (en) 2015-04-22
JP2012530447A (en) 2012-11-29
KR101671188B1 (en) 2016-11-01

Similar Documents

Publication Publication Date Title
EP1038210B1 (en) Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network
US8909193B2 (en) Authentication method
US8385889B2 (en) Radio communications system and method
CN106162517B (en) Virtual SIM card management method and system
US8131317B2 (en) Apparatus and method for downloading SIM data in mobile communication system
US8413215B2 (en) System and method for extending secure authentication using unique session keys derived from entropy
US9047444B2 (en) Mobile application registration
EP2445241B1 (en) Method for authenticating a universal subscriber identity module and system thereof
US7289805B2 (en) Method and system for providing a temporary subscriber identity to a roaming mobile communications device
US8141137B2 (en) Authentication vector generation device, subscriber identity module, mobile communication system, authentication vector generation method, calculation method, and subscriber authentication method
US9065641B2 (en) Method and device for updating a key
US20070293192A9 (en) Identification of a terminal to a server
US7974603B2 (en) Authentication vector generating device, subscriber authentication module, mobile communication system, and authentication vector generation method
US20100197350A1 (en) Method and apparatus for controlling the uicc application file
US20080090548A1 (en) Method for tracking mobile communication terminal
US7650139B2 (en) Method for ensuring security of subscriber card
US8583081B2 (en) Method for calculating a first identifier of a secure element of a mobile terminal according to a second identifier of said secure element
KR100845325B1 (en) Method for changing the msisdn using the ota(over-the-air activation) in wcdma(wideband code division multiple access) mobile phone
KR20080088739A (en) Method for opening the service using the ota(over-the-air activation) in wcdma(wideband code division multiple access) mobile phone
KR20090019192A (en) System and method for limiting use of mobile communication terminal
KR101385846B1 (en) Communications method and communications systems
KR101269709B1 (en) Smart card and method for managing authentication number of smart card, smart card verification apparatus

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120116

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20150105

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/06 20060101ALI20141218BHEP

Ipc: H04W 12/06 20090101AFI20141218BHEP

Ipc: H04M 3/42 20060101ALI20141218BHEP

Ipc: H04L 9/32 20060101ALI20141218BHEP

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20180220

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: AT

Ref legal event code: REF

Ref document number: 1028483

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180815

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602010052595

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180808

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1028483

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180808

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181208

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181108

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181108

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181109

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602010052595

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20190509

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20190630

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190616

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190630

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190630

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190630

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190616

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190630

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181208

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20100616

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180808

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20230516

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230511

Year of fee payment: 14